Katalog der Deutschen Nationalbibliothek

Neuigkeiten

Leichte Bedienung, intuitive Suche: Die Betaversion unseres neuen Katalogs ist online! → Zur Betaversion des neuen DNB-Katalogs

 
Neuigkeiten Dienstag 18. November 2025: Die Lesesäle der Deutschen Nationalbibliothek in Frankfurt am Main öffnen wegen einer Personalversammlung erst ab 13 Uhr. // Tuesday 18 November 2025: The reading rooms of the German National Library in Frankfurt am Main will open at 13:00 due to a staff assembly.
 
 

Ergebnis der Suche nach: cod="ro"



Treffer 115 von 4505925 < < > <



Online Ressourcen
Link zu diesem Datensatz https://d-nb.info/1379531551
Titel Constructive Approaches for Security Analysis and Design of Embedded Systems : First International Conference, CASCADE 2025, Saint-Etienne, France, April 2–4, 2025, Proceedings / edited by Matthieu Rivain, Pascal Sasdrich
Person(en) Rivain, Matthieu (Herausgeber)
Sasdrich, Pascal (Herausgeber)
Organisation(en) SpringerLink (Online service) (Sonstige)
Ausgabe 1st ed. 2026
Verlag Cham : Springer Nature Switzerland, Imprint: Springer
Zeitliche Einordnung Erscheinungsdatum: 2026
Umfang/Format Online-Ressource, XI, 604 p. 198 illus., 153 illus. in color. : online resource.
Andere Ausgabe(n) Printed edition:: ISBN: 978-3-032-01404-7
Printed edition:: ISBN: 978-3-032-01406-1
Inhalt .-Attacks on Symmetric Cryptography. -- The Dangerous Message/Key Swap in HMAC. -- Practical Second-Order CPA Attack on Ascon with Proper Selection Function. -- Side-Channel Attacks. -- On the Success Rate of Simple Side-Channel Attacks against Masking with Unlimited Attack Traces. -- A Comparison of Graph-Inference Side-Channel Attacks Against SKINNY. -- Physical Security. -- Robust and Reliable PUF Protocol Exploiting Non-Monotonic Quantization and Neyman-Pearson Lemma. -- Towards Package Opening Detection at Power-up by Monitoring Thermal Dissipation. -- Partial Key Overwrite Attacks in Microcontrollers: a Survey. -- RISC-V. -- Combined Masking and Shuffling for Side-Channel Secure Ascon on RISC-V. -- A Hardware Design Methodology to Prevent Microarchitectural Transition Leakages. -- Machine Learning. -- Taking AI-Based Side-Channel Attacks to a New Dimension. -- Avenger Ensemble: Genetic Algorithm-Driven Ensemble Selection for Deep Learning-based Side-Channel Analysis. -- Improving Leakage Exploitability in Horizontal Side Channel Attacks through Anomaly Mitigation with Unsupervised Neural Networks. -- Profiling Side-Channel Attack on HQC Polynomial Multiplication Using Machine Learning Methods. -- Attacks on Post-Quantum Cryptography. -- Simple Power Analysis assisted Chosen Cipher-Text Attack on ML-KEM. -- A Horizontal Attack on the Codes and Restricted Objects Signature Scheme (CROSS). -- Vladimir Sarde and Nicolas Debande. -- Message-Recovery Horizontal Correlation Attack on Classic McEliece. -- Breaking HuFu with 0 Leakage: A Side-Channel Analysis. -- Securing Post-Quantum Cryptography. -- X2X: Low-Randomness and High-Throughput A2B and B2A conversions for d+1 shares in Hardware. -- Area Efficient Polynomial Arithmetic Accelerator for Post-Quantum Digital Signatures and KEMs. -- Efficient Error Detection Methods for the Number Theoretic Transforms in Lattice-Based Algorithms. -- A Fault-Resistant NTT by Polynomial Evaluation and Interpolation. -- Homomorphic Encryption and White-Box Cryptography. -- Hybrid Homomorphic Encryption Resistance to Side-channel Attacks. -- White-Box Implementation Techniques for the HFE Family.
Persistent Identifier URN: urn:nbn:de:101:1-2510220408045.277935617897
DOI: 10.1007/978-3-032-01405-4
URL https://doi.org/10.1007/978-3-032-01405-4
ISBN/Einband/Preis 978-3-032-01405-4
Sprache(n) Englisch (eng)
Beziehungen Lecture Notes in Computer Science ; 15952
DDC-Notation 005.82 (maschinell ermittelte DDC-Kurznotation)
Sachgruppe(n) 004 Informatik

Online-Zugriff Archivobjekt öffnen




Treffer 115 von 4505925
< < > <


E-Mail-IconAdministration